Optimization of a novel programmable data-flow crypto processor using NSGA-II algorithm
[Display omitted] The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic functional units to four synchronous regions was proposed in a previous work. In this paper, the problem of selecting the n...
Saved in:
Published in | Journal of advanced research Vol. 12; pp. 67 - 78 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Egypt
Elsevier B.V
01.07.2018
Elsevier |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | [Display omitted]
The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic functional units to four synchronous regions was proposed in a previous work. In this paper, the problem of selecting the number of synchronous regions and the distribution of functional units among these regions is formulated as a combinatorial multi-objective optimization problem. The objective functions are chosen as: the implementation area, the execution delay, and the consumed energy when running the well-known AES algorithm. To solve this problem, a modified version of the Genetic Algorithm - known as NSGA-II - linked to a component database and a processor emulator, has been invoked. It is found that the performance improvement introduced by operating the processor regions at different clocks is offset by the necessary delay introduced by wrappers needed to communicate between the asynchronous regions. With a two clock-periods delay, the minimum processor delay of the asynchronous case is 311% of the delay obtained in the synchronous case, and the minimum consumed energy is 308% more in the asynchronous design when compared to its synchronous counterpart. This research also identifies the Instruction Region as the main design bottleneck. For the synchronous case, the Pareto front contains solutions with 4 regions that minimize delay and solutions with 7 regions that minimize area or energy. A minimum-delay design is selected for hardware implementation, and the FPGA version of the optimized processor is tested and correct operation is verified for AES and RC6 encryption/decryption algorithms. |
---|---|
AbstractList | The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic functional units to four synchronous regions was proposed in a previous work. In this paper, the problem of selecting the number of synchronous regions and the distribution of functional units among these regions is formulated as a combinatorial multi-objective optimization problem. The objective functions are chosen as: the implementation area, the execution delay, and the consumed energy when running the well-known AES algorithm. To solve this problem, a modified version of the Genetic Algorithm - known as NSGA-II - linked to a component database and a processor emulator, has been invoked. It is found that the performance improvement introduced by operating the processor regions at different clocks is offset by the necessary delay introduced by wrappers needed to communicate between the asynchronous regions. With a two clock-periods delay, the minimum processor delay of the asynchronous case is 311% of the delay obtained in the synchronous case, and the minimum consumed energy is 308% more in the asynchronous design when compared to its synchronous counterpart. This research also identifies the Instruction Region as the main design bottleneck. For the synchronous case, the Pareto front contains solutions with 4 regions that minimize delay and solutions with 7 regions that minimize area or energy. A minimum-delay design is selected for hardware implementation, and the FPGA version of the optimized processor is tested and correct operation is verified for AES and RC6 encryption/decryption algorithms. The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic functional units to four synchronous regions was proposed in a previous work. In this paper, the problem of selecting the number of synchronous regions and the distribution of functional units among these regions is formulated as a combinatorial multi-objective optimization problem. The objective functions are chosen as: the implementation area, the execution delay, and the consumed energy when running the well-known AES algorithm. To solve this problem, a modified version of the Genetic Algorithm - known as NSGA-II - linked to a component database and a processor emulator, has been invoked. It is found that the performance improvement introduced by operating the processor regions at different clocks is offset by the necessary delay introduced by wrappers needed to communicate between the asynchronous regions. With a two clock-periods delay, the minimum processor delay of the asynchronous case is 311% of the delay obtained in the synchronous case, and the minimum consumed energy is 308% more in the asynchronous design when compared to its synchronous counterpart. This research also identifies the Instruction Region as the main design bottleneck. For the synchronous case, the Pareto front contains solutions with 4 regions that minimize delay and solutions with 7 regions that minimize area or energy. A minimum-delay design is selected for hardware implementation, and the FPGA version of the optimized processor is tested and correct operation is verified for AES and RC6 encryption/decryption algorithms. Keywords: Programmable crypto processor, Data-flow crypto processor, NSGA-II Genetic Algorithm, Multi-objective optimization, FPGA implementation, Design space exploration [Display omitted] The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic functional units to four synchronous regions was proposed in a previous work. In this paper, the problem of selecting the number of synchronous regions and the distribution of functional units among these regions is formulated as a combinatorial multi-objective optimization problem. The objective functions are chosen as: the implementation area, the execution delay, and the consumed energy when running the well-known AES algorithm. To solve this problem, a modified version of the Genetic Algorithm - known as NSGA-II - linked to a component database and a processor emulator, has been invoked. It is found that the performance improvement introduced by operating the processor regions at different clocks is offset by the necessary delay introduced by wrappers needed to communicate between the asynchronous regions. With a two clock-periods delay, the minimum processor delay of the asynchronous case is 311% of the delay obtained in the synchronous case, and the minimum consumed energy is 308% more in the asynchronous design when compared to its synchronous counterpart. This research also identifies the Instruction Region as the main design bottleneck. For the synchronous case, the Pareto front contains solutions with 4 regions that minimize delay and solutions with 7 regions that minimize area or energy. A minimum-delay design is selected for hardware implementation, and the FPGA version of the optimized processor is tested and correct operation is verified for AES and RC6 encryption/decryption algorithms. |
Author | Osama, Karim Elsayed, Hany M. El-Hadidi, Mahmoud T. Bakr, Mohamed Aslan, Heba K. |
AuthorAffiliation | a Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Cairo University, Giza 12613, Egypt b College of Computing and Information Technology, Arab Academy of Science and Technology and Maritime Transport, Cairo, Egypt c Informatics Department, Electronics Research Institute, Cairo, Egypt |
AuthorAffiliation_xml | – name: c Informatics Department, Electronics Research Institute, Cairo, Egypt – name: a Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Cairo University, Giza 12613, Egypt – name: b College of Computing and Information Technology, Arab Academy of Science and Technology and Maritime Transport, Cairo, Egypt |
Author_xml | – sequence: 1 givenname: Mahmoud T. surname: El-Hadidi fullname: El-Hadidi, Mahmoud T. email: hadidi@eun.eg, mahmoud.hadidi@gmail.com organization: Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Cairo University, Giza 12613, Egypt – sequence: 2 givenname: Hany M. surname: Elsayed fullname: Elsayed, Hany M. organization: Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Cairo University, Giza 12613, Egypt – sequence: 3 givenname: Karim surname: Osama fullname: Osama, Karim organization: Department of Electronics and Electrical Communications Engineering, Faculty of Engineering, Cairo University, Giza 12613, Egypt – sequence: 4 givenname: Mohamed orcidid: 0000-0002-9654-9369 surname: Bakr fullname: Bakr, Mohamed organization: College of Computing and Information Technology, Arab Academy of Science and Technology and Maritime Transport, Cairo, Egypt – sequence: 5 givenname: Heba K. surname: Aslan fullname: Aslan, Heba K. organization: Informatics Department, Electronics Research Institute, Cairo, Egypt |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/30046480$$D View this record in MEDLINE/PubMed |
BookMark | eNp9kcFu1DAQhi1UREvpC3BAOXJJsJ3EcSSEVFVQVqraQ0EcLccep46SONjercrT47Bl1V46F49m_vnGmv8tOprdDAi9J7ggmLBPQzFIDwXFpCkIKTCmr9AJxS3OCaXV0SEv6TE6C2HAKUrOW0LeoOMS44pVHJ-gXzdLtJP9I6N1c-ZMJrPZ7WDMFu96L6dJdiNkWkaZm9HdZ8o_LNGtXQUhOJ9tg5377Pr28jzfbDI59s7beDe9Q6-NHAOcPb6n6Oe3rz8uvudXN5ebi_OrXNWUxLztTGUwKSUHBh00usFamdKUEmTX1JLWynBDeaco4YR1jCZpzUrMm4pwxctTtNlztZODWLydpH8QTlrxr-B8L6SPVo0gzMroNK-I1hXXmBOl27pVGtIOXunE-rJnLdtuAq1gjl6Oz6DPO7O9E73bCYbrpmIsAT4-Arz7vYUQxWSDgnGUM7htEBQ3jLdNw1cp3UuVdyF4MIc1BIvVYDGI1WCxGiwIEcngNPTh6QcPI__tTILPewGkk-8seBGUhVmBth5UTDexL_H_ArSCulk |
CitedBy_id | crossref_primary_10_1007_s13202_020_01066_1 |
Cites_doi | 10.1007/11552055_2 10.1109/ISCA.2001.937439 10.1145/513918.514113 10.1049/ip-cdt:20050131 10.1007/978-3-662-44491-7_10 10.1007/BF02125404 10.1007/978-3-319-31875-2_26 10.1109/TCE.2004.1277865 10.1109/NRSC.2016.7450850 10.1145/359340.359342 10.1016/j.ress.2005.11.018 10.1145/1146909.1147040 10.1109/4235.996017 10.1007/s13389-011-0025-8 10.1109/DSD.2005.33 10.1109/IPDPS.2011.199 10.1007/978-3-642-00641-8_35 10.1016/S0167-9260(04)00032-X 10.15803/ijnc.2.1_56 10.1007/3-540-48059-5_20 10.1109/ReConFig.2008.76 10.1090/S0025-5718-1987-0866109-5 10.1504/IJHPSA.2010.034541 10.1142/S0218126615501583 10.1109/TPDS.2005.51 10.1145/2501654.2501655 10.1007/s11227-010-0413-3 10.1109/ICCAD.2014.7001346 10.1109/DSD.2007.4341542 10.1109/ICSICT.2008.4734992 10.1109/TVLSI.2009.2037327 10.1109/ISCA.2002.1003573 10.1109/IWRSP.2000.855217 10.1631/jzus.C1200370 10.1007/978-3-540-24714-2_15 10.1109/CMC.2010.127 10.1109/IMSCCS.2006.208 10.1109/CAIA.1993.366666 10.1109/IPDPS.2011.143 10.1145/1013948.1013952 |
ContentType | Journal Article |
Copyright | 2017 2017 Production and hosting by Elsevier B.V. on behalf of Cairo University. 2017 |
Copyright_xml | – notice: 2017 – notice: 2017 Production and hosting by Elsevier B.V. on behalf of Cairo University. 2017 |
DBID | 6I. AAFTH NPM AAYXX CITATION 7X8 5PM DOA |
DOI | 10.1016/j.jare.2017.11.002 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access PubMed CrossRef MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | PubMed CrossRef MEDLINE - Academic |
DatabaseTitleList | PubMed |
Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Sciences (General) |
EISSN | 2090-1224 |
EndPage | 78 |
ExternalDocumentID | oai_doaj_org_article_fc218bd841dd48d081cd959cdecf884d 10_1016_j_jare_2017_11_002 30046480 S2090123217301170 |
Genre | Journal Article |
GroupedDBID | --K 0R~ 0SF 1B1 1~5 4.4 457 4G. 53G 5VS 6I. 7-5 AACTN AAEDT AAEDW AAFTH AAIKJ AALRI AAXUO ABFRF ABMAC ACGFS ADBBV ADEZE AEFWE AEXQZ AFTJW AGHFR AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ AOIJS BCNDV E3Z EBS EJD FDB GROUPED_DOAJ GX1 HH5 HYE HZ~ IPNFZ IXB J1W KQ8 M41 NCXOZ O-L O9- OK1 OZT RIG ROL RPM SES SSZ UNMZH XH2 ADVLN AFJKZ AKRWK NPM AAYXX CITATION 7X8 5PM |
ID | FETCH-LOGICAL-c521t-9bf4f013a8e6ebe7d70dcf3f3aeab75a25cf8f28bc21816b623a8563087418c83 |
IEDL.DBID | RPM |
ISSN | 2090-1232 |
IngestDate | Tue Oct 22 15:16:01 EDT 2024 Tue Sep 17 21:24:54 EDT 2024 Sat Oct 05 05:19:40 EDT 2024 Thu Sep 26 15:15:44 EDT 2024 Sat Sep 28 08:46:27 EDT 2024 Fri Feb 23 02:31:22 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | FPGA implementation Programmable crypto processor Data-flow crypto processor Multi-objective optimization Design space exploration NSGA-II Genetic Algorithm |
Language | English |
License | This is an open access article under the CC BY-NC-ND license. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c521t-9bf4f013a8e6ebe7d70dcf3f3aeab75a25cf8f28bc21816b623a8563087418c83 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ORCID | 0000-0002-9654-9369 |
OpenAccessLink | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6057466/ |
PMID | 30046480 |
PQID | 2076897786 |
PQPubID | 23479 |
PageCount | 12 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_fc218bd841dd48d081cd959cdecf884d pubmedcentral_primary_oai_pubmedcentral_nih_gov_6057466 proquest_miscellaneous_2076897786 crossref_primary_10_1016_j_jare_2017_11_002 pubmed_primary_30046480 elsevier_sciencedirect_doi_10_1016_j_jare_2017_11_002 |
PublicationCentury | 2000 |
PublicationDate | 2018-07-01 |
PublicationDateYYYYMMDD | 2018-07-01 |
PublicationDate_xml | – month: 07 year: 2018 text: 2018-07-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Egypt |
PublicationPlace_xml | – name: Egypt |
PublicationTitle | Journal of advanced research |
PublicationTitleAlternate | J Adv Res |
PublicationYear | 2018 |
Publisher | Elsevier B.V Elsevier |
Publisher_xml | – name: Elsevier B.V – name: Elsevier |
References | IBM 4767–002 PCIe cryptographic coprocessor (HSM) data sheet, IBM Corporation, 2016. Pargas R, Jain R. A parallel stochastic optimization algorithm for solving 2D bin packing problems. In: Proceedings 9th Conference on Artificial Intelligence for Applications 1993; 18–25. Hodjat, Verbauwhede (b0070) 2004 Deb (b0215) 2001 Barat F, Lauwereins R. Reconfigurable instruction set processors: a survey. In: Proceedings 11th International Workshop on Rapid System Prototyping (RSP 2000) 21–23 June 2000; 168–73. Grand M, Bossuet L, Gogniat G, Le Gal B, Delahaye JP, Dallet D. A reconfigurable multi-core cryptoprocessor for multi-channel communication systems. In: Proceedings 25th IEEE International Parallel and Distributed Processing Symposium 16–20 May 2011; 199–206. Ravi S, Raghunathan A, Potlapally N, Sankardass M. System design methodologies for a wireless security processing platform. In: Proceedings 39th Annual Design Automation Conference (DAC’02) 2002: 777–82. Mohamadi (b0240) 2010; 4 National Bureau of Standards. Data Encryption Standard, FIPS-Pub. 46. U.S. Department of Commerce January 1977. Ni S, Dou Y, Chen K, Deng L. A novel design of flexible crypto coprocessor and its application. In: Wu J, Chen H, Wang X, editors. Advanced computer architecture. communications in computer and information science 2014; 451: 128–139. Lomonaco MJ. Cryptarray: a scalable and reconfigurable architecture for cryptographic applications. M.Sc. Thesis, University of Central Florida, 2004. Stevens KS, Golani P, Beerel PA. Energy and performance models for synchronous and asynchronous communication. In: IEEE Transactions on VLSI Systems March 2011; 19(3); 369–382. Kim HW, Lee S. Design and implementation of a private and public key crypto processor and its application to a security system. IEEE Trans Consumer Electronics February 2004;50(1): 214–24. Hämäläinen P, Hännikäinen M, Hämäläinen T, Corporaal T, Saarvinen J. Implementation of encryption algorithms on transport triggered architecture. In: Proceedings International Symposium on Circuits and Systems (ISCAS 2001) May 2001: 6–9. Farouk H, El-Hadidi MT, Abou El Farag A. GALS-based LPSP: Implementation of a novel architecture for low power high performance security processors. In: Proceedings 25th IEEE International Parallel and Distributed Processing Symposium 16–20 May 2011; 542–50. Fronte D, Perez A, Payrat E. Celator: A multi-algorithm cryptographic co-processor. In: Proceedings of the International Conference on Reconfigurable Computing and FPGAs (ReConFig’08) 2008; 438–43. Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM February 1978;21(2): 120–6. Deb K, Pratap A, Agarwal S, Meyarivan T. A fast and elitist multi-objective genetic algorithm: NSGA-II. IEEE Trans. Evolutionary Computing April 2002; 6(2); 182–97. Majzoub, Diab (b0160) 2012; 59 Elsayed HM, El-Hadidi MT, Osama K, Aslan H. Multi-objective genetic algorithm-based optimization of an asynchronous data-flow security processor. In: Proceedings 2016 33rd National Radio Science Conference (NRSC2016) 2016; 168–77. Hämäläinen P, Heikkinen J, Hännikäinen M, Hämäläinen TD. Design of transport triggered architecture processors for wireless encryption. In: Proceedings 8th Euromicro Conference on Digital System Design (DSD’05) 2005; 144–52. Gonzalez I, Gomez-Arribas FJ. Ciphering algorithms in Microblaze-based embedded systems. IEE Proc-Comput. Digit Tech March 2006;153(2); 87–92. Reeves (b0230) 1996; 63 Sayilar G, Chiou D. Cryptoraptor: high throughput reconfigurable cryptographic processor. In: Proceedings Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on, 2–6 Nov. 2014; 155–61. Niu, Wu, Liu, Zhang, Chen (b0170) 2013; 14 Taylor RR, Goldstein SC. A high-performance flexible architecture for cryptography. In: Proceedings Workshop on Cryptographic Hardware and Embedded Systems (CHES1999) August 1999; 231–45. Shi, Lee (b0030) July 2000; 10–12 Arora D, Raghunathan A, Ravi S, Sankaradass M, Jha NK, Chakradhar ST. Software architecture exploration for high-performance security processing on a multiprocessor mobile SoC. In: Proceedings 43rd Annual Design Automation Conference July 24–28 2006; 496–501. Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation January 1987;48(177): 203–9. Wu L, Weaver C, Austin T. CryptoManiac- a fast flexible architecture for secure communication. In: Proceedings 28th Annual International Symposium on Computer Architecture 30 June – 4 July 2001; 110–9. IBM 4765 PCIe cryptographic coprocessor data sheet, IBM Corporation, 2011. Kempf (b0210) 2011 Benhadjyoussef N, Elhadjyoussef W, Machhout M, Tourki R. Enhancing a 32-bit processor core with efficient cryptographic instructions. J Circ, Syst, Comp 2015;24(10). Farouk, El-Hadidi, Abou El-Farag (b9000) 2012; 2 El-Hadidi MT, Elsayed HM, Aslan H, Osama K. Structured design approach for an optimal programmable synchronous security processor. In: Kim H, Choi D, editors. Information Security Applications 2015; 313–25. Iyer A, Marculescu D. Power and performance evaluation of globally asynchronous locally synchronous processors. In: Proceedings 29th Annual International Symposium on Computer Architecture 2002; 158–68. Bossuet L, Grand M, Gaspar L, Fischer V, Gogniat G. Architectures of flexible symmetric key crypto engines - A survey from hardware coprocessor to multi-crypto-processor system on chip. ACM Computing Surveys August 2013; 45(4) Article 41. Theodoropolous D, Siskosy A, Pnevmatikatosy D. CCproc- a custom VLIW cryptography co-processor for symmetric-key ciphers. In: J. Becker et al., editors. Proceedings International Workshop on Applied Reconfigurable Computing (ARC2009): Reconfigurable Computing: Architectures, Tools and Applications, - LNCS 5453–2009; 318–23. Großschädl J, Tillich S, Szekely A. Performance evaluation of instruction set extensions for long integer modular arithmetic on a SPARC V8 processor. Proceedings 10th Euromicro Conference on Digital System Design (DSD 2007) 2007: 680–9. NIST. Advanced Encryption Standard, FIPS-Pub 197 26 November 26 2001. Jenkins, Mamidi, Schulte, Glossner (b0050) 2010; 2 Sun K, Pan X, Wang J, Wang J. Design of a novel asynchronous reconfigurable architecture for cryptographic applications. In: Proceedings First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06) 20–24 June 2006; 751–7. Elbirt AJ, Paar C. Instruction-level distributed processing for symmetric-key cryptography. In: IEEE Transactions on Parallel and Distributed Systems May 2005; 16(5); 468–80. Han L, Han J, Zeng X, Lu R, Zhao J. A programmable security processor for cryptography algorithms. In: Proceedings 9th International Conference on Solid-State and Integrated-Circuit Technology (ICSICT 2008) 20–23 Oct. 2008; 2144–7. Buchty R, Heintze N, Oliva D. Cryptonite – a programmable crypto processor architecture for high-bandwidth applications. In: Proceedings International Conference on Architecture of Computing Systems (ARCS 2004) 2004; 184–98. Gueron (b0055) 2012 Dandalis A, Prasanna VK. An adaptive cryptographic engine for internet protocol security architectures. ACM Trans Des Automation Electronic Syst. July 2004;9(3); 333–53. Tillich S, Großschädl J, Szekely A. An instruction set extension for fast and memory-efficient AES implementation. CMS 2005, LNCS 3677 2005: 11–21. Konak, Coitb, Smith (b0220) 2006; 91 Li C, Jiang Y, Su D, Xu Y, Luo Z. A new design of low cost security coprocessor for portable electronic devices. In: Proceedings 2010 International Conference on Communications and Mobile Computing (CMC2010) April 2010; 12–4. Grabher, Großschädl, Hoerder, Järvinen, Page, Tillich, Wójcik (b0120) 2010; 2 Wa B, Liu L. A flexible and energy-efficient reconfigurable architecture for symmetric cipher processing. 2015 IEEE International Symposium on Circuits and Systems (ISCAS) 24–27 May 2015; 1182–5. Gries (b0205) 2004; 38 10.1016/j.jare.2017.11.002_b0035 10.1016/j.jare.2017.11.002_b0155 Jenkins (10.1016/j.jare.2017.11.002_b0050) 2010; 2 10.1016/j.jare.2017.11.002_b0110 10.1016/j.jare.2017.11.002_b0075 10.1016/j.jare.2017.11.002_b0195 10.1016/j.jare.2017.11.002_b0150 10.1016/j.jare.2017.11.002_b0190 Konak (10.1016/j.jare.2017.11.002_b0220) 2006; 91 Deb (10.1016/j.jare.2017.11.002_b0215) 2001 Reeves (10.1016/j.jare.2017.11.002_b0230) 1996; 63 Gries (10.1016/j.jare.2017.11.002_b0205) 2004; 38 Gueron (10.1016/j.jare.2017.11.002_b0055) 2012 10.1016/j.jare.2017.11.002_b0115 10.1016/j.jare.2017.11.002_b0235 10.1016/j.jare.2017.11.002_b0200 10.1016/j.jare.2017.11.002_b0045 10.1016/j.jare.2017.11.002_b0165 Farouk (10.1016/j.jare.2017.11.002_b9000) 2012; 2 10.1016/j.jare.2017.11.002_b0085 10.1016/j.jare.2017.11.002_b0040 Kempf (10.1016/j.jare.2017.11.002_b0210) 2011 Mohamadi (10.1016/j.jare.2017.11.002_b0240) 2010; 4 10.1016/j.jare.2017.11.002_b0080 Majzoub (10.1016/j.jare.2017.11.002_b0160) 2012; 59 Shi (10.1016/j.jare.2017.11.002_b0030) 2000; 10–12 10.1016/j.jare.2017.11.002_b0005 10.1016/j.jare.2017.11.002_b0125 10.1016/j.jare.2017.11.002_b0245 10.1016/j.jare.2017.11.002_b0010 10.1016/j.jare.2017.11.002_b0175 10.1016/j.jare.2017.11.002_b0130 10.1016/j.jare.2017.11.002_b0095 Grabher (10.1016/j.jare.2017.11.002_b0120) 2010; 2 10.1016/j.jare.2017.11.002_b0090 10.1016/j.jare.2017.11.002_b0250 10.1016/j.jare.2017.11.002_b0015 10.1016/j.jare.2017.11.002_b0135 10.1016/j.jare.2017.11.002_b0255 10.1016/j.jare.2017.11.002_b0145 10.1016/j.jare.2017.11.002_b0100 10.1016/j.jare.2017.11.002_b0065 10.1016/j.jare.2017.11.002_b0020 10.1016/j.jare.2017.11.002_b0185 10.1016/j.jare.2017.11.002_b0140 10.1016/j.jare.2017.11.002_b0060 Hodjat (10.1016/j.jare.2017.11.002_b0070) 2004 10.1016/j.jare.2017.11.002_b0180 Niu (10.1016/j.jare.2017.11.002_b0170) 2013; 14 10.1016/j.jare.2017.11.002_b0260 10.1016/j.jare.2017.11.002_b0105 10.1016/j.jare.2017.11.002_b0225 10.1016/j.jare.2017.11.002_b0025 |
References_xml | – volume: 10–12 start-page: 138 year: July 2000 end-page: 148 ident: b0030 article-title: Bit permutation instructions for accelerating software cryptography publication-title: Proc IEEE Int Conf Appl-specific Syst, Arch Processors contributor: fullname: Lee – start-page: 34 year: 2004 end-page: 45 ident: b0070 publication-title: High-throughput programmable cryptocoprocessor. IEEE Micro May-June contributor: fullname: Verbauwhede – year: 2012 ident: b0055 article-title: Intel® advanced encryption standard (AES) new instructions set contributor: fullname: Gueron – volume: 63 start-page: 371 year: 1996 end-page: 396 ident: b0230 article-title: Hybrid genetic algorithms for bin-packing and related problems publication-title: Ann Oper Res contributor: fullname: Reeves – volume: 2 start-page: 1 year: 2010 end-page: 18 ident: b0120 article-title: An exploration of mechanisms for dynamic cryptographic instruction set extension publication-title: J Cryptogr Eng contributor: fullname: Wójcik – volume: 91 start-page: 992 year: 2006 end-page: 1007 ident: b0220 article-title: Multi-objective optimization using genetic algorithms: a tutorial publication-title: Reliab Eng Syst Saf Sept contributor: fullname: Smith – volume: 4 start-page: 253 year: 2010 end-page: 266 ident: b0240 article-title: Application of genetic algorithm for the bin packing problem with a new representation scheme publication-title: Math Sci contributor: fullname: Mohamadi – start-page: 23 year: 2011 end-page: 47 ident: b0210 article-title: Principles of design space exploration contributor: fullname: Kempf – volume: 38 start-page: 131 year: 2004 end-page: 183 ident: b0205 article-title: Methods for evaluating and covering the design space during early design development publication-title: VLSI J Dec contributor: fullname: Gries – volume: 14 start-page: 642 year: 2013 end-page: 651 ident: b0170 article-title: A 10 gbps in-line network security processor based on configurable hetero-multi-cores publication-title: J Zhejiang Univ-SCIENCE C (Comp Electron) contributor: fullname: Chen – volume: 59 start-page: 22 year: 2012 end-page: 41 ident: b0160 article-title: MorphoSys reconfigurable hardware for cryptography: the twofish case publication-title: J Supercomput contributor: fullname: Diab – volume: 2 start-page: 56 year: 2012 end-page: 78 ident: b9000 article-title: GALS-based LPSP: performance analysis of a novel architecture for low power high performance security processors publication-title: Int J Netw Comput contributor: fullname: Abou El-Farag – volume: 2 start-page: 203 year: 2010 end-page: 214 ident: b0050 article-title: Instruction set extensions for the advanced encryption standard on a multithreaded software defined radio platform publication-title: Int J High Perform Syst Arch contributor: fullname: Glossner – year: 2001 ident: b0215 article-title: Multi-objective optimization using evolutionary algorithms contributor: fullname: Deb – ident: 10.1016/j.jare.2017.11.002_b0040 doi: 10.1007/11552055_2 – ident: 10.1016/j.jare.2017.11.002_b0085 doi: 10.1109/ISCA.2001.937439 – volume: 10–12 start-page: 138 year: 2000 ident: 10.1016/j.jare.2017.11.002_b0030 article-title: Bit permutation instructions for accelerating software cryptography publication-title: Proc IEEE Int Conf Appl-specific Syst, Arch Processors contributor: fullname: Shi – ident: 10.1016/j.jare.2017.11.002_b0035 doi: 10.1145/513918.514113 – ident: 10.1016/j.jare.2017.11.002_b0020 – ident: 10.1016/j.jare.2017.11.002_b0175 – ident: 10.1016/j.jare.2017.11.002_b0140 doi: 10.1049/ip-cdt:20050131 – ident: 10.1016/j.jare.2017.11.002_b0150 doi: 10.1007/978-3-662-44491-7_10 – volume: 63 start-page: 371 issue: 3 year: 1996 ident: 10.1016/j.jare.2017.11.002_b0230 article-title: Hybrid genetic algorithms for bin-packing and related problems publication-title: Ann Oper Res doi: 10.1007/BF02125404 contributor: fullname: Reeves – year: 2001 ident: 10.1016/j.jare.2017.11.002_b0215 contributor: fullname: Deb – start-page: 34 year: 2004 ident: 10.1016/j.jare.2017.11.002_b0070 publication-title: High-throughput programmable cryptocoprocessor. IEEE Micro May-June contributor: fullname: Hodjat – ident: 10.1016/j.jare.2017.11.002_b0260 doi: 10.1007/978-3-319-31875-2_26 – ident: 10.1016/j.jare.2017.11.002_b0155 – ident: 10.1016/j.jare.2017.11.002_b0065 doi: 10.1109/TCE.2004.1277865 – start-page: 23 year: 2011 ident: 10.1016/j.jare.2017.11.002_b0210 contributor: fullname: Kempf – ident: 10.1016/j.jare.2017.11.002_b0245 doi: 10.1109/NRSC.2016.7450850 – ident: 10.1016/j.jare.2017.11.002_b0010 doi: 10.1145/359340.359342 – year: 2012 ident: 10.1016/j.jare.2017.11.002_b0055 contributor: fullname: Gueron – volume: 91 start-page: 992 issue: 9 year: 2006 ident: 10.1016/j.jare.2017.11.002_b0220 article-title: Multi-objective optimization using genetic algorithms: a tutorial publication-title: Reliab Eng Syst Saf Sept doi: 10.1016/j.ress.2005.11.018 contributor: fullname: Konak – ident: 10.1016/j.jare.2017.11.002_b0095 doi: 10.1145/1146909.1147040 – ident: 10.1016/j.jare.2017.11.002_b0225 doi: 10.1109/4235.996017 – volume: 2 start-page: 1 year: 2010 ident: 10.1016/j.jare.2017.11.002_b0120 article-title: An exploration of mechanisms for dynamic cryptographic instruction set extension publication-title: J Cryptogr Eng doi: 10.1007/s13389-011-0025-8 contributor: fullname: Grabher – ident: 10.1016/j.jare.2017.11.002_b0200 – volume: 4 start-page: 253 issue: 3 year: 2010 ident: 10.1016/j.jare.2017.11.002_b0240 article-title: Application of genetic algorithm for the bin packing problem with a new representation scheme publication-title: Math Sci contributor: fullname: Mohamadi – ident: 10.1016/j.jare.2017.11.002_b0180 doi: 10.1109/DSD.2005.33 – ident: 10.1016/j.jare.2017.11.002_b0110 doi: 10.1109/IPDPS.2011.199 – ident: 10.1016/j.jare.2017.11.002_b0165 doi: 10.1007/978-3-642-00641-8_35 – volume: 38 start-page: 131 issue: 2 year: 2004 ident: 10.1016/j.jare.2017.11.002_b0205 article-title: Methods for evaluating and covering the design space during early design development publication-title: VLSI J Dec doi: 10.1016/S0167-9260(04)00032-X contributor: fullname: Gries – volume: 2 start-page: 56 issue: 1 year: 2012 ident: 10.1016/j.jare.2017.11.002_b9000 article-title: GALS-based LPSP: performance analysis of a novel architecture for low power high performance security processors publication-title: Int J Netw Comput doi: 10.15803/ijnc.2.1_56 contributor: fullname: Farouk – ident: 10.1016/j.jare.2017.11.002_b0130 doi: 10.1007/3-540-48059-5_20 – ident: 10.1016/j.jare.2017.11.002_b0185 doi: 10.1109/ReConFig.2008.76 – ident: 10.1016/j.jare.2017.11.002_b0015 doi: 10.1090/S0025-5718-1987-0866109-5 – volume: 2 start-page: 203 issue: 2–3 year: 2010 ident: 10.1016/j.jare.2017.11.002_b0050 article-title: Instruction set extensions for the advanced encryption standard on a multithreaded software defined radio platform publication-title: Int J High Perform Syst Arch doi: 10.1504/IJHPSA.2010.034541 contributor: fullname: Jenkins – ident: 10.1016/j.jare.2017.11.002_b0060 doi: 10.1142/S0218126615501583 – ident: 10.1016/j.jare.2017.11.002_b0125 doi: 10.1109/TPDS.2005.51 – ident: 10.1016/j.jare.2017.11.002_b0025 doi: 10.1145/2501654.2501655 – volume: 59 start-page: 22 issue: 1 year: 2012 ident: 10.1016/j.jare.2017.11.002_b0160 article-title: MorphoSys reconfigurable hardware for cryptography: the twofish case publication-title: J Supercomput doi: 10.1007/s11227-010-0413-3 contributor: fullname: Majzoub – ident: 10.1016/j.jare.2017.11.002_b0080 – ident: 10.1016/j.jare.2017.11.002_b0190 doi: 10.1109/ICCAD.2014.7001346 – ident: 10.1016/j.jare.2017.11.002_b0045 doi: 10.1109/DSD.2007.4341542 – ident: 10.1016/j.jare.2017.11.002_b0100 doi: 10.1109/ICSICT.2008.4734992 – ident: 10.1016/j.jare.2017.11.002_b0255 doi: 10.1109/TVLSI.2009.2037327 – ident: 10.1016/j.jare.2017.11.002_b0250 doi: 10.1109/ISCA.2002.1003573 – ident: 10.1016/j.jare.2017.11.002_b0115 doi: 10.1109/IWRSP.2000.855217 – volume: 14 start-page: 642 issue: 8 year: 2013 ident: 10.1016/j.jare.2017.11.002_b0170 article-title: A 10 gbps in-line network security processor based on configurable hetero-multi-cores publication-title: J Zhejiang Univ-SCIENCE C (Comp Electron) doi: 10.1631/jzus.C1200370 contributor: fullname: Niu – ident: 10.1016/j.jare.2017.11.002_b0090 doi: 10.1007/978-3-540-24714-2_15 – ident: 10.1016/j.jare.2017.11.002_b0075 – ident: 10.1016/j.jare.2017.11.002_b0105 doi: 10.1109/CMC.2010.127 – ident: 10.1016/j.jare.2017.11.002_b0145 doi: 10.1109/IMSCCS.2006.208 – ident: 10.1016/j.jare.2017.11.002_b0235 doi: 10.1109/CAIA.1993.366666 – ident: 10.1016/j.jare.2017.11.002_b0195 doi: 10.1109/IPDPS.2011.143 – ident: 10.1016/j.jare.2017.11.002_b0005 – ident: 10.1016/j.jare.2017.11.002_b0135 doi: 10.1145/1013948.1013952 |
SSID | ssj0000388911 |
Score | 2.1568415 |
Snippet | [Display omitted]
The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based... The optimization of a novel programmable data-flow crypto processor dedicated to security applications is considered. An architecture based on assigning basic... |
SourceID | doaj pubmedcentral proquest crossref pubmed elsevier |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Publisher |
StartPage | 67 |
SubjectTerms | Data-flow crypto processor Design space exploration FPGA implementation Multi-objective optimization NSGA-II Genetic Algorithm Programmable crypto processor |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQT1wQ5RmgyEgcQCiwiRM_jgVRWg7lABW9WX62W-0mq3RLxb9nxnGqXZDgwi1KrCTzsGcm-eYzIS9xyfc4AStpeNmIwErLFRxVEG2a4GtjEtrimB-eNJ9P29ONrb4QEzbSA4-KexcdBCHrZVN530gPEcx51Srng4tSNj6tvjO1UUylNZhJqdLmu_VMIfyA1bljZgR3XZgBOTIr8RYpPPM3lSkqJfL-reD0Z_L5O4ZyIygd3CV3cjZJ90cpdsmt0N0ju3m-XtJXmVT69X3y_QusDcvcdEn7SA3t-h9hQTNAa4ktVBTxomVc9NfUDT9X656uxj6CfqAIkD-jx18_7ZdHR9Qszvphvj5fPiAnBx-_fTgs86YKpcO9C0plYxMh7zMycDCg8GLmXWSRmWCsaE3dgl5jLS3qveIW0iMjkURMIs-Nk-wh2en6Ljwm1DVRMSOcdBzqDK5MzXwIUljLpRWSFeTNpFS9Grkz9AQqu9BoAo0mgCJEgwkK8h71fjMSea_TCfAGnb1B_8sbCtJOVtM5hRhTA7jV_K8PfzGZWMP8wp8mpgv91SUMgoJMIcteQR6NJr95RZZ-DMtZQcSWM2zJsH2lm58nDm-oIkXD-ZP_IfRTchtEkSOI-BnZWQ9XYQ9SpbV9nmbFL9C7EcI priority: 102 providerName: Directory of Open Access Journals – databaseName: ScienceDirect dbid: IXB link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaqnrggyjMUkJE4gFDYTezYzrGtKC2HcigVe7P83KbaTVbpFsS_x-M4KwISB255OMnEY49n7G8-I_QGTL6FDlgIxXLKHck1q8NREUYb6mypVERbXLCzK_p5US320MmYCwOwymT7B5serXW6Mku1Ods0zeyynNfRIShiI-UQt5OqiEl8i-PdPAuwndRxG14on8MDKXdmgHndqB7YMgv-Acg80-zKOD5FGv_JMPW3G_onmvK34en0Abqf_Ep8NIh-gPZc-xAdpJ57i98meul3j9C3L8FKrFP6Je48VrjtvrsVTlCtNSRTYUCO5n7V_cCm_7nZdngzZBR0PQao_BJfXH46ys_PsVotu77ZXq8fo6vTj19PzvK0vUJuYBeDvNae-uABKuFYUCW3fG6NJ54opzSvVFkZL3wptAE3gOngKCkBdGICGG-MIE_Qftu17hnChvqaKG6EYSHiYLUqiXVOcK2Z0FyQDL0fK1VuBhYNOcLLbiSoQIIKQjgigwoydAz1visJDNjxQtcvZWoC0oNU2gpaWEuFDZ6NsXVVG-uC1ILaDFWj1uSkQYVXNf_8-OtRxTL0NFg-Ua3r7m5DoRCa1cC3l6Gng8p3IpK4RCzmGeKTxjD5h-mdtrmObN4hnuSUsef_Ke8huhfOxIAgfoH2t_2dexn8pK1-FTvCLz4XEKc priority: 102 providerName: Elsevier |
Title | Optimization of a novel programmable data-flow crypto processor using NSGA-II algorithm |
URI | https://dx.doi.org/10.1016/j.jare.2017.11.002 https://www.ncbi.nlm.nih.gov/pubmed/30046480 https://search.proquest.com/docview/2076897786 https://pubmed.ncbi.nlm.nih.gov/PMC6057466 https://doaj.org/article/fc218bd841dd48d081cd959cdecf884d |
Volume | 12 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbacuGCKM_wWBmJAwhlH3nYznFbUbpUFARU3Vvk53ar3WSVblvx75lxnGoXJA5coihxkklmbH-Ov_lMyFts8g1WwJGQLM64TWPFCtgbQW-TWZNI6dkWp-z4LPs8zac7JO9yYTxpX6t5v1os-9X8wnMrV0s96Hhig29fDgGC84yxwS7ZhQDdGKL75jcVovDr7ibDApkHaRKSZVpe16VsUB5zxPuo3jnE5WxSP8GHypAbfZOX8N_qov6GoH8yKTe6pqOH5EHAlHTc2r5Pdmz1iOyHWntF3wVp6fePyflXaCGWIfWS1o5KWtU3dkEDTWuJiVQUWaOxW9S3VDe_VuuartpsgrqhSJOf0dMfn8bxZELlYlY38_XF8gk5O_r48_A4DksrxBpXMIgL5TIH6E8Ky8CN3PCh0S51qbRS8VwmuXbCJUJphABMAUiSAqXEBKrdaJE-JXtVXdnnhOrMFankWmgGow1WyCQ11gquFBOKizQiH7qPWq5aBY2yo5ZdluiNEr0BQ5ESvBGRA_zudyVR_dofqJtZGWKgdGiVMiIbGZMJA6hGmyIvtLFgtchMRPLOa2UAEi1AgFvN__nwN52LS6hlOHUiK1tfX0EhGJYVqLUXkWety-9M7KInInwrGLbeYfsMBLZX8g6B_OK_r3xJ7oP9ouUPvyJ76-bavgaUtFY9cm988v38pOf_MsB2Mj3o-ZryG8uRFHI |
link.rule.ids | 230,315,730,783,787,867,888,2109,3513,27936,27937,45886,53804,53806 |
linkProvider | National Library of Medicine |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELZKOcAFUZ7haSQOIJR9xI7tHEtF2YV2QaIVvVl-brfaJKt0C-Lf43GSahckDtyixElsz4z9Wf7mM0KvYci3EIBjoVhKuSOpZkW4GofZhjqbKRXZFjM2OaWfzvKzHZT3uTCRtG_0YlAty0G1OI_cylVphj1PbPj1-CBAcE4ZG95AN0O8jujGIj0OwESIIp68m40K4B6QrEuXaZldF6oBgcwxH4B-5wgOtCFxiw-0ITdmpyjivzVJ_Q1C_-RSbkxOh3fRnQ5V4v229ntox1X30F4Xt5f4TScu_fY--v4ljBFll3yJa48Vruofbok7olYJqVQYeKOpX9Y_sWl-rdY1XrX5BHWDgSg_x7NvH_fT6RSr5bxuFuvz8gE6PfxwcjBJu8MVUgNnGKSF9tQH_KeEY8GQ3PKRNZ54opzSPFdZbrzwmdAGQADTASYpAWJiAvRujCAP0W5VV-4xwob6gihuhGFhvcEKlRHrnOBaM6G5IAl613eqXLUaGrInl11IsIYEa4TFiAzWSNB76PfrkqB_HW_UzVx2XiA91EpbQcfWUmEDrjG2yAtjXai1oDZBeW812UGJFiKETy3--fNXvYlliDPYPFGVq68uQ6GwMCtAbS9Bj1qTX1ex954E8S1n2GrD9pPg2lHLu3PlJ__95kt0a3JyfCSPprPPT9Ht0BbRsomfod11c-WeB8y01i9ihPwG0xgULA |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELagSIgLankGChiJAwhlH3FiO8dSWLo8lkpQ0Zvl53ar3SRKtyD-PR7HqXZB4sAtSpzE9szYn-XP3yD0AoZ8AwE45pKmObMkVbT0V2M_2-TWZFIGtsWMHp3kH06L041UX4G0r9ViUC1Xg2pxFriVzUoPe57Y8PjzoYfgLKd02Bg3vI5u-Jgd0Y2FehiECedlyL6bjUrgH5AsHpnp2F3nsgWRzDEbgIbnCJLakLDNB_qQGzNUEPLfmqj-BqJ_8ik3JqjJLrodkSU-6Fqwh67Z6g7ai7F7gV9GgelXd9H3L36cWMUDmLh2WOKq_mGXOJK1VnCcCgN3NHXL-ifW7a9mXeOmO1NQtxjI8nM8-_r-IJ1OsVzO63axPlvdQyeTd98Oj9KYYCHVkMcgLZXLnceAklvqjckMGxntiCPSSsUKmRXacZdxpQEIUOWhkuQgKMZB80Zzch_tVHVlHyKsc1cSyTTX1K85aCkzYqzlTCnKFeMkQa_7ThVNp6MheoLZuQBrCLCGX5AIb40EvYF-vyoJGtjhRt3ORfQE4aBWyvB8bEzOjcc22pRFqY31tea5SVDRW01EONHBBP-pxT9__rw3sfCxBhsosrL15YUv5BdnJSjuJehBZ_KrKvbekyC25Qxbbdh-4t076HlHd370328-QzeP307Ep-ns42N0yzeFd4TifbSzbi_tEw-b1uppCJDfxnQVPw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optimization+of+a+novel+programmable+data-flow+crypto+processor+using+NSGA-II+algorithm&rft.jtitle=Journal+of+advanced+research&rft.au=El-Hadidi%2C+Mahmoud+T&rft.au=Elsayed%2C+Hany+M&rft.au=Osama%2C+Karim&rft.au=Bakr%2C+Mohamed&rft.date=2018-07-01&rft.issn=2090-1232&rft.volume=12&rft.spage=67&rft_id=info:doi/10.1016%2Fj.jare.2017.11.002&rft_id=info%3Apmid%2F30046480&rft.externalDocID=30046480 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2090-1232&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2090-1232&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2090-1232&client=summon |